共 47 条
- [1] Leveraging Intel SGX Technology to Protect Security-Sensitive Applications 2018 IEEE 17TH INTERNATIONAL SYMPOSIUM ON NETWORK COMPUTING AND APPLICATIONS (NCA), 2018,
- [2] Model Checking of Security-Sensitive Business Processes FORMAL ASPECTS IN SECURITY AND TRUST, 2010, 5983 : 66 - 80
- [3] Efficient Provisioning of a Trustworthy Environment for Security-Sensitive Applications TRUST AND TRUSTWORTHY COMPUTING, TRUST 2015, 2015, 9229 : 300 - 309
- [4] Cerberus: Automated Synthesis of Enforcement Mechanisms for Security-Sensitive Business Processes TOOLS AND ALGORITHMS FOR THE CONSTRUCTION AND ANALYSIS OF SYSTEMS (TACAS 2016), 2016, 9636 : 567 - 572
- [5] WSSMT: Towards the Automated Analysis of Security-Sensitive Services and Applications 12TH INTERNATIONAL SYMPOSIUM ON SYMBOLIC AND NUMERIC ALGORITHMS FOR SCIENTIFIC COMPUTING (SYNASC 2010), 2011, : 417 - 424
- [6] Securing Display Path for Security-Sensitive Applications on Mobile Devices CMC-COMPUTERS MATERIALS & CONTINUA, 2018, 55 (01): : 17 - 35
- [7] Fast Switch into a Trustworthy Virtual Machine for Running Security-Sensitive Applications 2018 IEEE INTERNATIONAL CONFERENCE ON AUTOMATION, QUALITY AND TESTING, ROBOTICS (AQTR), 2018,